Skip to main content

Operation Cargotalon: Targeting Russian Aerospace Defense Using Eaglet Implant

Medium
Published: Thu Jul 24 2025 (07/24/2025, 05:49:44 UTC)
Source: AlienVault OTX General

Description

UNG0901, a threat group targeting Russian aerospace and defense sectors, has been discovered conducting a spear-phishing campaign against the Voronezh Aircraft Production Association. The operation, dubbed 'CargoTalon', utilizes a custom DLL implant called EAGLET, which is disguised as a ZIP file containing transport documents. The infection chain involves a malicious LNK file that executes the EAGLET implant, which then establishes communication with a command-and-control server for remote access and data exfiltration. The campaign employs sophisticated tactics, including decoy documents related to Russian logistics operations, and shows similarities with another threat group known as Head Mare. The attackers' motivation appears to be espionage against Russian governmental and non-governmental entities.

AI-Powered Analysis

AILast updated: 07/24/2025, 09:17:55 UTC

Technical Analysis

Operation Cargotalon is a targeted cyber espionage campaign attributed to the threat group UNG0901, focusing on the Russian aerospace and defense sector, specifically targeting the Voronezh Aircraft Production Association. The attackers employ a spear-phishing vector, delivering a malicious LNK file disguised as a ZIP archive containing transport documents, which when executed, loads a custom DLL implant named EAGLET. This implant establishes a covert command-and-control (C2) channel to facilitate remote access and data exfiltration. The campaign uses sophisticated social engineering techniques, including decoy documents related to Russian logistics operations to increase the likelihood of victim interaction. The implant leverages multiple tactics and techniques mapped to MITRE ATT&CK, such as T1218.011 (signed binary proxy execution), T1566.001 (spear-phishing attachment), T1082 (system information discovery), T1005 (data from local system), T1036 (masquerading), T1482 (domain trust discovery), T1041 (exfiltration over C2 channel), T1059.001 (command and scripting interpreter: PowerShell), T1537 (transfer data to cloud account), and T1071.001 (application layer protocol: Web protocol). The operation shows similarities with another group known as Head Mare, suggesting possible shared tooling or tactics. The primary motivation appears espionage-driven, aiming to gather sensitive information from Russian aerospace and defense entities. No known exploits in the wild or affected software versions are specified, indicating a targeted, manual campaign rather than widespread automated exploitation. The medium severity rating reflects the targeted nature and potential impact on confidentiality and integrity of sensitive defense information.

Potential Impact

For European organizations, the direct impact of Operation Cargotalon is limited given the campaign's focus on Russian aerospace and defense sectors. However, European aerospace and defense companies with ties or partnerships to Russian entities, or those involved in similar supply chains, could be at risk if the threat actor expands targeting or reuses the EAGLET implant or spear-phishing tactics. The espionage nature of the campaign poses risks to confidentiality of sensitive intellectual property and strategic information. Additionally, the use of sophisticated social engineering and custom implants indicates a high level of adversary capability, which could be adapted against European targets in future operations. The campaign also highlights the ongoing threat of supply chain and logistics-themed spear-phishing attacks, which European organizations should be vigilant against. The potential for lateral movement or data exfiltration within interconnected defense ecosystems could have cascading effects on European defense readiness and industrial security.

Mitigation Recommendations

European organizations, particularly those in aerospace and defense sectors, should implement targeted mitigations beyond generic advice: 1) Enhance spear-phishing detection by training users to recognize decoy documents and suspicious LNK files, especially those masquerading as transport or logistics documents. 2) Employ application whitelisting and restrict execution of LNK files from email attachments or untrusted sources. 3) Monitor for anomalous DLL loading behaviors and use endpoint detection and response (EDR) tools to detect custom implants like EAGLET. 4) Implement strict network segmentation to limit lateral movement and isolate sensitive systems. 5) Monitor outbound network traffic for unusual C2 communication patterns, particularly over web protocols, and apply network-based anomaly detection. 6) Conduct threat hunting exercises focused on MITRE ATT&CK techniques identified in this campaign. 7) Maintain up-to-date threat intelligence feeds to detect indicators of compromise related to UNG0901 and EAGLET. 8) Enforce multi-factor authentication and least privilege principles to reduce impact if credentials are compromised. 9) Collaborate with national cybersecurity centers to share intelligence and coordinate defensive measures against espionage campaigns targeting aerospace and defense sectors.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/operation-cargotalon-ung0901-targets-russian-aerospace-defense-sector-using-eaglet-implant"]
Adversary
UNG0901
Pulse Id
6881c978dd5260be2347dcb4
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash08a92ba1d1d9e5c498dcaf53af7cd071
hash65967d019076e700deb20dcbc989c99c
hash7e52be17fd33a281c70fec14805113a8
hash88453eb954669b5c7ac712ecf1e0179c
hashb49a7ef89cfb317a540996c3425fcdc2
hashbe990a49fa1e3789ebc5c55961038029
hashd424a2d0a7481138ad219c98942cf628
hash2a14a9dd1032479ab5bf8ed945ef9a22ebd4999d
hash49a18dc1d8f84394d3373481dbac89d11e373dbd
hash6942e07e7d08781cba571211a08e779838e72e9a
hash851157c01da6e85ffa94ded7f42cab19aa8528d6
hashc52d70b92e41db70d4ca342c8dc32eff7883c861
hashc61a8f68a58461d386f443fb99346534ea7023d4
hashd9a4fd39a55cd20d55e00d3cace3f637b8888213
hash01f12bb3f4359fae1138a194237914f4fcdbf9e472804e428a765ad820f399be
hash02098f872d00cffabb21bd2a9aa3888d994a0003d3aa1c80adcfb43023809786
hash204544fc8a8cac64bb07825a7bd58c54cb3e605707e2d72206ac23a1657bfe1e
hash3e93c6cd9d31e0428085e620fdba017400e534f9b549d4041a5b0baaee4f7aff
hash413c9e2963b8cca256d3960285854614e2f2e78dba023713b3dd67af369d5d08
hash44ada9c8629d69dd3cf9662c521ee251876706ca3a169ca94c5421eb89e0d652
hash4d4304d7ad1a8d0dacb300739d4dcaade299b28f8be3f171628a7358720ca6c5
hasha8fdc27234b141a6bd7a6791aa9cb332654e47a57517142b3140ecf5b0683401
hasha9324a1fa529e5c115232cbbc60330d37cef5c20860bafc63b11e14d1e75697c
hashae736c2b4886d75d5bbb86339fb034d37532c1fee2252193ea4acc4d75d8bfd7
hashb683235791e3106971269259026e05fdc2a4008f703ff2a4d32642877e57429a
hashc3caa439c255b5ccd87a336b7e3a90697832f548305c967c0c40d2dc40e2032e
hashe12f7ef9df1c42bc581a5f29105268f3759abea12c76f9cb4d145a8551064204
hashf6baa2b5e77e940fe54628f086926d08cc83c550cd2b4b34b4aab38fd79d2a0d

Ip

ValueDescriptionCopy
ip185.225.17.104
ip188.127.254.44

Threat ID: 6881f6b8ad5a09ad0031b694

Added to database: 7/24/2025, 9:02:48 AM

Last enriched: 7/24/2025, 9:17:55 AM

Last updated: 7/26/2025, 5:28:35 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats